CVE-2025-5717

An authenticated remote code execution (RCE) vulnerability exists in multiple WSO2 products due to improper input validation in the event processor admin service. A user with administrative access to the SOAP admin services can exploit this flaw by deploying a Siddhi execution plan containing malicious Java code, resulting in arbitrary code execution on the server.

Exploitation of this vulnerability requires a valid user account with administrative privileges, limiting the attack surface to authenticated but potentially malicious users.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
ADJACENT_NETWORK
LOW
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
WSO2CNA
6.8 MEDIUM
ADJACENT_NETWORK
LOW
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
wso2api_control_plane
4.5.0
wso2api_manager
3.0.0
wso2api_manager
3.1.0
wso2api_manager
3.2.0
wso2api_manager
3.2.1
wso2api_manager
4.0.0
wso2api_manager
4.1.0
wso2api_manager
4.2.0
wso2api_manager
4.3.0
wso2api_manager
4.4.0
wso2api_manager
4.5.0
wso2open_banking_am
2.0.0
wso2traffic_manager
4.5.0
𝑥
= Vulnerable software versions